cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-23804,https://securityvulnerability.io/vulnerability/CVE-2024-23804,Stack Overflow Vulnerability in Tecnomatix Plant Simulation Could Allow Code Execution,"A vulnerability exists in Tecnomatix Plant Simulation, specifically affecting versions prior to V2201.0012 for V2201 and V2302.0006 for V2302. This vulnerability stems from a stack overflow condition during the processing of specially crafted PSOBJ files. An attacker leveraging this weakness may gain the ability to execute arbitrary code within the context of the application, potentially leading to unauthorized access or control over the affected system.",Siemens,"Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0006099999882280827,false,,false,false,false,,false,false,2024-02-13T09:00:20.764Z,0 CVE-2024-23803,https://securityvulnerability.io/vulnerability/CVE-2024-23803,Buffer Overflow Vulnerability in Tecnomatix Plant Simulation,"A vulnerability exists in Tecnomatix Plant Simulation where an out of bounds write occurs when parsing a specially crafted SPP file. This flaw can lead to the potential execution of arbitrary code in the context of the current process, impacting system integrity and confidentiality. The vulnerability affects all versions of Tecnomatix Plant Simulation V2201 and versions prior to V2302.0007 of V2302.",Siemens,"Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-02-13T09:00:19.548Z,0 CVE-2024-23802,https://securityvulnerability.io/vulnerability/CVE-2024-23802,Tecnomatix Plant Simulation Vulnerability: Out of Bounds Read Could Lead to Code Execution,"A vulnerability has been identified in Siemens Tecnomatix Plant Simulation versions V2201 and V2302, specifically in all versions prior to V2201.0012 and V2302.0006. This flaw involves an out of bounds read past the end of an allocated structure during the parsing of specially crafted SPP files. If exploited, an attacker may be able to execute arbitrary code within the context of the current process, posing potential risks to the integrity and security of systems utilizing the affected software.",Siemens,"Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-02-13T09:00:18.318Z,0 CVE-2024-23801,https://securityvulnerability.io/vulnerability/CVE-2024-23801,Tecnomatix Plant Simulation Vulnerability Could Lead to Denial of Service,"A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions), Tecnomatix Plant Simulation V2302 (All versions < V2302.0007). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted SPP files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.",Siemens,"Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",5.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,false,false,2024-02-13T09:00:16.989Z,0 CVE-2024-23800,https://securityvulnerability.io/vulnerability/CVE-2024-23800,Tecnomatix Plant Simulation Vulnerability Could Lead to Denial of Service,"A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions), Tecnomatix Plant Simulation V2302 (All versions < V2302.0007). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted SPP files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.",Siemens,"Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",5.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,false,false,2024-02-13T09:00:15.818Z,0 CVE-2024-23799,https://securityvulnerability.io/vulnerability/CVE-2024-23799,Tecnomatix Plant Simulation Vulnerability Could Lead to Denial of Service,"A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions), Tecnomatix Plant Simulation V2302 (All versions < V2302.0007). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted SPP files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.",Siemens,"Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",5.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,false,false,2024-02-13T09:00:14.553Z,0 CVE-2024-23798,https://securityvulnerability.io/vulnerability/CVE-2024-23798,Stack Overflow Vulnerability in Tecnomatix Plant Simulation Could Allow Code Execution,"A stack overflow vulnerability has been identified in Siemens' Tecnomatix Plant Simulation, specifically in versions V2201 (all versions prior to V2201.0012) and V2302 (all versions prior to V2302.0006). This security issue is triggered while parsing carefully crafted WRL files, which may lead to unauthorized code execution within the context of the running process. As users operate with these affected applications, attackers could exploit this vulnerability to gain control over system processes, heightening the importance of applying available security updates or patches.",Siemens,"Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0006900000153109431,false,,false,false,false,,false,false,2024-02-13T09:00:13.285Z,0 CVE-2024-23797,https://securityvulnerability.io/vulnerability/CVE-2024-23797,Stack Overflow Vulnerability in Tecnomatix Plant Simulation Could Allow Code Execution,"A vulnerability has been identified in several versions of Tecnomatix Plant Simulation, where a stack overflow occurs when parsing specially crafted WRL files. This security flaw may enable attackers to execute arbitrary code within the context of the affected process, thereby compromising the integrity and security of systems utilizing these software versions. To protect against potential exploits related to CVE-2024-23797, it is essential that users update to the patched versions: V2201.0012 or later for V2201 and V2302.0006 or later for V2302.",Siemens,"Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0006900000153109431,false,,false,false,false,,false,false,2024-02-13T09:00:12.025Z,0 CVE-2024-23796,https://securityvulnerability.io/vulnerability/CVE-2024-23796,Heap-Based Buffer Overflow Vulnerability in Tecnomatix Plant Simulation,"A vulnerability exists in Tecnomatix Plant Simulation that is triggered by heap-based buffer overflow errors when parsing specially crafted WRL files. This flaw affects versions prior to V2201.0012 of Tecnomatix Plant Simulation V2201, as well as versions prior to V2302.0006 of Tecnomatix Plant Simulation V2302. Exploitation of this vulnerability may allow an attacker to execute arbitrary code within the context of the affected process, posing significant security risks to users.",Siemens,"Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0006600000197067857,false,,false,false,false,,false,false,2024-02-13T09:00:10.640Z,0 CVE-2024-23795,https://securityvulnerability.io/vulnerability/CVE-2024-23795,Buffer Overflow Vulnerability in Tecnomatix Plant Simulation,"An identified vulnerability in Tecnomatix Plant Simulation from Siemens could potentially allow attackers to execute arbitrary code. The issue arises due to an out of bounds write that occurs during the parsing of specially crafted WRL files. This vulnerability affects Tecnomatix Plant Simulation V2201 prior to version 2201.0012 and V2302 prior to version 2302.0006, exposing users to significant security risks if not mitigated. Organizations using affected versions should prioritize patching to protect their systems from potential exploitation.",Siemens,"Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0006600000197067857,false,,false,false,false,,false,false,2024-02-13T09:00:09.340Z,0 CVE-2023-44085,https://securityvulnerability.io/vulnerability/CVE-2023-44085,Out of Bounds Read Vulnerability in Tecnomatix Plant Simulation by Siemens,"An out of bounds read vulnerability has been detected in Tecnomatix Plant Simulation versions V2201 and V2302, specifically in all versions prior to V2201.0009 and V2302.0003. This flaw occurs due to an improper memory read when parsing specially crafted SPP files, which could enable an attacker to potentially execute arbitrary code in the context of the affected process, leading to security risks and possible exploitation.",Siemens,"Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0005099999834783375,false,,false,false,false,,false,false,2023-10-10T11:15:00.000Z,0 CVE-2023-44082,https://securityvulnerability.io/vulnerability/CVE-2023-44082,Out of Bounds Write Vulnerability in Tecnomatix Plant Simulation by Siemens,"A vulnerability has been identified in Tecnomatix Plant Simulation versions prior to V2201.0009 and V2302.0003. This issue pertains to an out of bounds write that occurs while the application processes specially crafted SPP files. Exploiting this vulnerability may allow an attacker to execute arbitrary code in the context of the running process, potentially compromising the integrity and confidentiality of the system.",Siemens,"Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0005099999834783375,false,,false,false,false,,false,false,2023-10-10T11:15:00.000Z,0 CVE-2023-44084,https://securityvulnerability.io/vulnerability/CVE-2023-44084,Out-of-Bounds Read Vulnerability in Tecnomatix Plant Simulation by Siemens,"An out-of-bounds read vulnerability has been discovered in Tecnomatix Plant Simulation, specifically in versions prior to V2201.0009 for V2201 and V2302.0003 for V2302. The vulnerability arises when the application processes specially crafted SPP files, leading to potential code execution within the context of the current process. This issue poses significant risks as it could enable unauthorized actions by attackers targeting the impacted software.",Siemens,"Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0005099999834783375,false,,false,false,false,,false,false,2023-10-10T11:15:00.000Z,0 CVE-2023-45204,https://securityvulnerability.io/vulnerability/CVE-2023-45204,Type Confusion Vulnerability in Tecnomatix Plant Simulation by Siemens,"A vulnerability exists in Tecnomatix Plant Simulation software that stems from type confusion when processing specially crafted IGS files. This flaw can enable attackers to execute arbitrary code within the context of the running process, potentially compromising system integrity and confidentiality. Users of versions prior to V2201.0009 and V2302.0003 are particularly at risk.",Siemens,"Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0005499999970197678,false,,false,false,false,,false,false,2023-10-10T11:15:00.000Z,0 CVE-2023-44083,https://securityvulnerability.io/vulnerability/CVE-2023-44083,Out of Bounds Write Vulnerability in Tecnomatix Plant Simulation by Siemens,"An identified flaw in Tecnomatix Plant Simulation allows for an out of bounds write past the end of an allocated buffer when parsing a specially crafted SPP file. This vulnerability could potentially enable an attacker to execute arbitrary code within the context of the affected process, posing a significant security risk. Users are advised to update to the latest versions to mitigate this vulnerability.",Siemens,"Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0005099999834783375,false,,false,false,false,,false,false,2023-10-10T11:15:00.000Z,0 CVE-2023-44086,https://securityvulnerability.io/vulnerability/CVE-2023-44086,Out of Bounds Read Vulnerability in Tecnomatix Plant Simulation by Siemens,"A vulnerability exists in Tecnomatix Plant Simulation that enables an out of bounds read past the end of an allocated structure. This issue occurs during the parsing of specially crafted SPP files, which could potentially allow an attacker to execute unauthorized code within the context of the current process. Users are advised to upgrade to the latest versions to mitigate any associated risks.",Siemens,"Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0005099999834783375,false,,false,false,false,,false,false,2023-10-10T11:15:00.000Z,0 CVE-2023-44081,https://securityvulnerability.io/vulnerability/CVE-2023-44081,Out of Bounds Write Vulnerability in Tecnomatix Plant Simulation by Siemens,"A vulnerability has been found in Tecnomatix Plant Simulation, affecting versions prior to V2201.0009 and V2302.0003. This flaw occurs during the parsing of specially crafted SPP files, leading to an out of bounds write past the end of an allocated buffer. Exploiting this vulnerability could allow an attacker to execute arbitrary code within the context of the current process, potentially compromising the system's integrity.",Siemens,"Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0005099999834783375,false,,false,false,false,,false,false,2023-10-10T11:15:00.000Z,0 CVE-2023-44087,https://securityvulnerability.io/vulnerability/CVE-2023-44087,Out of Bounds Read Vulnerability in Tecnomatix Plant Simulation by Siemens,"An out of bounds read vulnerability has been detected in Tecnomatix Plant Simulation applications. Specifically, this flaw affects versions prior to V2201.0009 for V2201 and V2302.0003 for V2302. The vulnerability manifests during the parsing of specially crafted SPP files, potentially enabling an attacker to execute arbitrary code within the context of the current process, posing significant risks to system integrity and data security.",Siemens,"Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0005099999834783375,false,,false,false,false,,false,false,2023-10-10T11:15:00.000Z,0 CVE-2023-45601,https://securityvulnerability.io/vulnerability/CVE-2023-45601,Stack Overflow Vulnerability in Parasolid and Tecnomatix Products,"A stack overflow vulnerability has been detected in specific versions of Parasolid and Tecnomatix Plant Simulation products. This vulnerability arises when the software processes specially crafted IGS files, leading to potential code execution in the context of the running process. Users of affected versions are advised to update to the latest releases to mitigate any associated risks.",Siemens,"Parasolid V35.0,Parasolid V35.1,Parasolid V36.0,Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.000590000010561198,false,,false,false,false,,false,false,2023-10-10T11:15:00.000Z,0 CVE-2023-38075,https://securityvulnerability.io/vulnerability/CVE-2023-38075,Use-After-Free Vulnerability in Siemens JT2Go and Teamcenter Visualization Products,"A use-after-free vulnerability has been discovered in several Siemens products, including JT2Go and various versions of Teamcenter Visualization and Tecnomatix Plant Simulation. This vulnerability can be exploited while parsing specially crafted WRL files, potentially allowing an attacker to execute arbitrary code within the context of the affected application process. Users are advised to update their software to the latest versions to mitigate any risks associated with this vulnerability.",Siemens,"JT2Go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0008800000068731606,false,,false,false,false,,false,false,2023-09-12T10:15:00.000Z,0 CVE-2023-38071,https://securityvulnerability.io/vulnerability/CVE-2023-38071,Heap-Based Buffer Overflow Vulnerability in Siemens JT2Go and Teamcenter Visualization Products,"A heap-based buffer overflow vulnerability has been discovered in Siemens JT2Go, Teamcenter Visualization, and Tecnomatix Plant Simulation products. This vulnerability occurs while parsing specially crafted WRL files, potentially allowing attackers to execute arbitrary code within the context of the affected process. Users of these applications should assess their current versions and apply necessary updates to mitigate the risks associated with this exploit.",Siemens,"Jt2go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.000699999975040555,false,,false,false,false,,false,false,2023-09-12T10:15:00.000Z,0 CVE-2023-38072,https://securityvulnerability.io/vulnerability/CVE-2023-38072,Out of Bounds Write Vulnerability in Siemens JT2Go and Teamcenter Visualization Products,"An out of bounds write vulnerability has been detected in various Siemens applications, including JT2Go and Teamcenter Visualization products. This flaw occurs when the affected applications improperly manage memory while parsing specially crafted WRL files. An attacker could exploit this weakness to execute arbitrary code in the context of the current process, potentially leading to unauthorized access or control over the application.",Siemens,"JT2Go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0006799999973736703,false,,false,false,false,,false,false,2023-09-12T10:15:00.000Z,0 CVE-2023-38074,https://securityvulnerability.io/vulnerability/CVE-2023-38074,Type Confusion Vulnerability in Siemens Visualization and Simulation Products,"A type confusion vulnerability has been discovered in several Siemens products, including Teamcenter Visualization and Tecnomatix Plant Simulation. This vulnerability occurs while the applications parse WRL files, potentially allowing an attacker to execute arbitrary code within the context of the affected process. It impacts numerous versions, underscoring the need for users to apply necessary patches and updates to safeguard their systems.",Siemens,"JT2Go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.00044999999227002263,false,,false,false,false,,false,false,2023-09-12T10:15:00.000Z,0 CVE-2023-38076,https://securityvulnerability.io/vulnerability/CVE-2023-38076,Heap-Based Buffer Overflow in JT2Go and Teamcenter Visualization Applications,"A vulnerability has been identified in multiple versions of JT2Go and Teamcenter Visualization applications, as well as Tecnomatix Plant Simulation. This security flaw is characterized by a heap-based buffer overflow that occurs when the applications process specially crafted WRL files. Exploiting this vulnerability could enable an attacker to execute arbitrary code within the context of the affected process, potentially leading to unauthorized actions and data breaches.",Siemens,"JT2Go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0007399999885819852,false,,false,false,false,,false,false,2023-09-12T10:15:00.000Z,0 CVE-2023-38070,https://securityvulnerability.io/vulnerability/CVE-2023-38070,Stack-Based Buffer Overflow in JT2Go and Teamcenter Visualization by Siemens,"A stack-based buffer overflow vulnerability has been detected in certain versions of JT2Go and Teamcenter Visualization from Siemens. The flaw occurs while processing specially crafted WRL files, which could allow an attacker to execute arbitrary code within the context of the affected application. Various versions are impacted, necessitating immediate attention and patches to mitigate potential exploitation.",Siemens,"JT2Go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0010499999625608325,false,,false,false,false,,false,false,2023-09-12T10:15:00.000Z,0